Browsing by Subject "Wormhole Attack"
Now showing items 1-2 of 2
-
A Comprehensive Review on Performance of AODV Protocol for Wormhole Attack
(IJRET, 2014)Wireless Networking is becoming very popular and interesting technology especially in these days as everyone wants wireless connectivity at anywhere anytime. It contains numerous wireless network technologies such as WiFi, ... -
Performance analysis of spin protocol under different security threats in wireless sensor networks
(Central University of Punjab, 2014)The wireless sensor network consists of homogenous sensor nodes with limited energy and computational power which are self organisable. These nodes use radio frequency channels to communicate with each other wirelessly. ...